Featured Slideshow

British hacker Stephen Tomkinson has found two Blu-Ray-borne attacks.His first exploit relies on a poor Java implementation in a product called PowerDVD from CyberLink. PowerDVD plays DVDs on PCs and... read more

Twitter has tripled the size of its abuse support team after the number of reports it handled increased five-fold in six months thanks to an expansion of harassment controls.The company did not... read more

When we reviewed the Samsung Galaxy S5 last year, the handset made a surprisingly good impression, thanks to its blazing performance, outstanding battery life, and a stunning Super AMOLED screen. We... read more

Today at MWC 2015, we played with the ZTE Grand S3. ZTE's new flagship device lets users unlock their phones by looking at the front-facing camera. The cutting edge solution, called Eyeprint ID,... read more

After our recent discovery that our Samsung TV was sending voice recognition data over the internet unencrypted, they sent the following response:“Samsung takes consumer privacy very seriously and... read more

This article is a follow-up to my previous 2011 article on Reverse Engineering and Modifying Windows 8 apps. In this article we’ll see how to use innate Windows 8 security attack vectors in such a way that could compromise Windows 8 games revenue stream. We’ll review real-world examples for all Win8 programming languages and frameworks.

In the previous article we’ve seen security loopholes affecting all Windows 8 apps. However in this article we’ll focus on how to use these techniques to compromise games security. The reason we’ll be focusing on games is that they account for 51%+ of developer revenue on every mobile developer platform. Let me repeat that, games account for the majority of developer revenue. For example we can see from official Microsoft statistics that 64% of app purchases on Windows Phone 7 are for games.